Solutions and products for implementing security measures in line with the GDPR

Our solution will help you comply with EU regulations and easy protection of your data.

The General Data Protection Regulation (GDPR) issued by the European Union, along with currently valid Act No. 181/2014 on cyber security and Act No. 101/2000 on personal data protection, applies to all subjects that deal with personal information, in both private and public sector enterprises and governments.

GDPR brings several major changes in terms of institutions’ duties in dealing with personal or confidential information, and requires compliance with these from May 2018.

What changes does GDPR present?

Procedural

GDPR requires entities dealing with personal or sensitive information to notify the authorities of any leakage of personal information within 72 hours.

Organisational

GDPR requires establishing new working positions – a Data Protection Officer (external/internal) for consulting security measures and processes related to personal/confidential information, and a Personal Data Manager to deal with personal information within the organization.

Technical

GDPR also requires that organisations introduce suitable tools for providing sufficient informationto the authorities and for securing data against theft to prevent penalization.

Hot to ensure compliance?

We provide innovative software solutions for monitoring file movement, machine processing and data evaluation, along with data and information protection through file encryption.

Our experience and products can help you comply with the GDPR requirements.

Cryptographic protection of data saved on endpoints, external devices, file servers, and cloud storages. Support of two-factor user authentication. Control over access to external devices.

Securing data using online file encryption in their storage location, granting access to the data exclusively to their owners and authorised persons. Control and limitation of access to external memory devices.

Data containing personal details are secured against unauthorised access, as per law requirements. Data is secured during transfer and storage.